<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 11:54:23 +0000</lastBuildDate>
    <item>
      <title>b817de7b-aaa1-44cb-a8ef-fd6049b78547</title>
      <link>https://vulnerability.circl.lu/sighting/b817de7b-aaa1-44cb-a8ef-fd6049b78547/export</link>
      <description>{"uuid": "b817de7b-aaa1-44cb-a8ef-fd6049b78547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-critical-authentication-bypass-moveit-automation-cve-2026-4670-patch-immediately", "content": "", "creation_timestamp": "2026-05-04T08:08:49.000000Z"}</description>
      <content:encoded>{"uuid": "b817de7b-aaa1-44cb-a8ef-fd6049b78547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-critical-authentication-bypass-moveit-automation-cve-2026-4670-patch-immediately", "content": "", "creation_timestamp": "2026-05-04T08:08:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b817de7b-aaa1-44cb-a8ef-fd6049b78547/export</guid>
      <pubDate>Mon, 04 May 2026 08:08:49 +0000</pubDate>
    </item>
    <item>
      <title>0387d9a0-bfbe-428a-a2f1-f7e53deb4b77</title>
      <link>https://vulnerability.circl.lu/sighting/0387d9a0-bfbe-428a-a2f1-f7e53deb4b77/export</link>
      <description>{"uuid": "0387d9a0-bfbe-428a-a2f1-f7e53deb4b77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3ml27bvuujh2b", "content": "Progress Software issued a critical alert regarding two severe vulnerabilities in its MOVEit Automation platform, allowing authentication bypass and privilege escalation. CVE-2026-4670 enables unauthenticated access, while CVE-2026-5174 allows attackers to gain administrative rights.", "creation_timestamp": "2026-05-04T17:32:16.791290Z"}</description>
      <content:encoded>{"uuid": "0387d9a0-bfbe-428a-a2f1-f7e53deb4b77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3ml27bvuujh2b", "content": "Progress Software issued a critical alert regarding two severe vulnerabilities in its MOVEit Automation platform, allowing authentication bypass and privilege escalation. CVE-2026-4670 enables unauthenticated access, while CVE-2026-5174 allows attackers to gain administrative rights.", "creation_timestamp": "2026-05-04T17:32:16.791290Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0387d9a0-bfbe-428a-a2f1-f7e53deb4b77/export</guid>
      <pubDate>Mon, 04 May 2026 17:32:16 +0000</pubDate>
    </item>
    <item>
      <title>5e7f91d3-0dde-4491-9a19-c039d468119b</title>
      <link>https://vulnerability.circl.lu/sighting/5e7f91d3-0dde-4491-9a19-c039d468119b/export</link>
      <description>{"uuid": "5e7f91d3-0dde-4491-9a19-c039d468119b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml2f27kjle2s", "content": "Progress patches critical MOVEit Automation flaws CVE-2026-4670 (auth bypass, CVSS 9.8) and CVE-2026-5174 (input validation, CVSS 7.7) allowing unauthorized admin access. Fixes released for versions &amp;lt;=2025.1.4. #MOVEit #Airbus #Vulnerability", "creation_timestamp": "2026-05-04T19:15:20.825862Z"}</description>
      <content:encoded>{"uuid": "5e7f91d3-0dde-4491-9a19-c039d468119b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml2f27kjle2s", "content": "Progress patches critical MOVEit Automation flaws CVE-2026-4670 (auth bypass, CVSS 9.8) and CVE-2026-5174 (input validation, CVSS 7.7) allowing unauthorized admin access. Fixes released for versions &amp;lt;=2025.1.4. #MOVEit #Airbus #Vulnerability", "creation_timestamp": "2026-05-04T19:15:20.825862Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5e7f91d3-0dde-4491-9a19-c039d468119b/export</guid>
      <pubDate>Mon, 04 May 2026 19:15:20 +0000</pubDate>
    </item>
    <item>
      <title>eb33228c-ccbb-4923-8fb0-6740763aea64</title>
      <link>https://vulnerability.circl.lu/sighting/eb33228c-ccbb-4923-8fb0-6740763aea64/export</link>
      <description>{"uuid": "eb33228c-ccbb-4923-8fb0-6740763aea64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ml2pf3ek4p52", "content": "MOVEit automation flaws could enable full system compromise Progress fixes critical MOVEit Automation flaws, including an authentication bypass bug that could let attackers gain unauthorized access...\n\n#Breaking #News #Security #CVE-2026-4670 #CVE-2026-5174 #Hacking #hacking #news #information [\u2026]", "creation_timestamp": "2026-05-04T22:20:50.087595Z"}</description>
      <content:encoded>{"uuid": "eb33228c-ccbb-4923-8fb0-6740763aea64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ml2pf3ek4p52", "content": "MOVEit automation flaws could enable full system compromise Progress fixes critical MOVEit Automation flaws, including an authentication bypass bug that could let attackers gain unauthorized access...\n\n#Breaking #News #Security #CVE-2026-4670 #CVE-2026-5174 #Hacking #hacking #news #information [\u2026]", "creation_timestamp": "2026-05-04T22:20:50.087595Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/eb33228c-ccbb-4923-8fb0-6740763aea64/export</guid>
      <pubDate>Mon, 04 May 2026 22:20:50 +0000</pubDate>
    </item>
    <item>
      <title>1f740a4b-3351-45bd-b144-336e4acfb1e7</title>
      <link>https://vulnerability.circl.lu/sighting/1f740a4b-3351-45bd-b144-336e4acfb1e7/export</link>
      <description>{"uuid": "1f740a4b-3351-45bd-b144-336e4acfb1e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3ml4fuifrss2e", "content": "\ud83d\udd17 CVE : CVE-2026-4670, CVE-2026-4670, CVE-2026-5174", "creation_timestamp": "2026-05-05T14:35:23.790204Z"}</description>
      <content:encoded>{"uuid": "1f740a4b-3351-45bd-b144-336e4acfb1e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3ml4fuifrss2e", "content": "\ud83d\udd17 CVE : CVE-2026-4670, CVE-2026-4670, CVE-2026-5174", "creation_timestamp": "2026-05-05T14:35:23.790204Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1f740a4b-3351-45bd-b144-336e4acfb1e7/export</guid>
      <pubDate>Tue, 05 May 2026 14:35:23 +0000</pubDate>
    </item>
    <item>
      <title>4e0fe3ce-6f0f-4a64-89c5-7638a79a5ef8</title>
      <link>https://vulnerability.circl.lu/sighting/4e0fe3ce-6f0f-4a64-89c5-7638a79a5ef8/export</link>
      <description>{"uuid": "4e0fe3ce-6f0f-4a64-89c5-7638a79a5ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/groovysecurity.bsky.social/post/3ml4j7gaprw2q", "content": "MOVEit Automation patched yesterday \u2014 CVE-2026-4670 + CVE-2026-5174, pre-auth chain to admin.\n\nTwo months back, cPanel CVE-2026-41940: 40K servers exploited from Feb 23, patch April 30.\n\nA version banner says \"remediated.\" Whether the exploit still runs on your config is a different question.", "creation_timestamp": "2026-05-05T15:35:10.080694Z"}</description>
      <content:encoded>{"uuid": "4e0fe3ce-6f0f-4a64-89c5-7638a79a5ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/groovysecurity.bsky.social/post/3ml4j7gaprw2q", "content": "MOVEit Automation patched yesterday \u2014 CVE-2026-4670 + CVE-2026-5174, pre-auth chain to admin.\n\nTwo months back, cPanel CVE-2026-41940: 40K servers exploited from Feb 23, patch April 30.\n\nA version banner says \"remediated.\" Whether the exploit still runs on your config is a different question.", "creation_timestamp": "2026-05-05T15:35:10.080694Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/4e0fe3ce-6f0f-4a64-89c5-7638a79a5ef8/export</guid>
      <pubDate>Tue, 05 May 2026 15:35:10 +0000</pubDate>
    </item>
    <item>
      <title>dfaec400-5903-497f-a64b-e9d8361423e9</title>
      <link>https://vulnerability.circl.lu/sighting/dfaec400-5903-497f-a64b-e9d8361423e9/export</link>
      <description>{"uuid": "dfaec400-5903-497f-a64b-e9d8361423e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3ml4mf5zt5d25", "content": "Critical vulnerabilities in MOVEit Automation (CVE-2026-4670 &amp;amp; CVE-2026-5174) demand immediate patching to prevent unauthorized access and privilege escalation. #CyberSecurity #DataProtection #MOVEit Link: thedailytechfeed.com/critical-mov...", "creation_timestamp": "2026-05-05T16:32:04.225951Z"}</description>
      <content:encoded>{"uuid": "dfaec400-5903-497f-a64b-e9d8361423e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3ml4mf5zt5d25", "content": "Critical vulnerabilities in MOVEit Automation (CVE-2026-4670 &amp;amp; CVE-2026-5174) demand immediate patching to prevent unauthorized access and privilege escalation. #CyberSecurity #DataProtection #MOVEit Link: thedailytechfeed.com/critical-mov...", "creation_timestamp": "2026-05-05T16:32:04.225951Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/dfaec400-5903-497f-a64b-e9d8361423e9/export</guid>
      <pubDate>Tue, 05 May 2026 16:32:04 +0000</pubDate>
    </item>
    <item>
      <title>799d8809-c500-4b3c-bbb3-54fca2c7bc16</title>
      <link>https://vulnerability.circl.lu/sighting/799d8809-c500-4b3c-bbb3-54fca2c7bc16/export</link>
      <description>{"uuid": "799d8809-c500-4b3c-bbb3-54fca2c7bc16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ml5xk5vwpq2w", "content": "Critical 98 MOVEit Automation Flaw Opens Enterprise File Transfer Systems to Unauthenticated Takeover +\u00a0Video\n\nIntroduction: A critical authentication bypass vulnerability (CVE-2026-4670, CVSS 9.8) and a high-severity privilege escalation flaw (CVE-2026-5174, CVSS 7.7) have been disclosed in\u2026", "creation_timestamp": "2026-05-06T05:24:22.185250Z"}</description>
      <content:encoded>{"uuid": "799d8809-c500-4b3c-bbb3-54fca2c7bc16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ml5xk5vwpq2w", "content": "Critical 98 MOVEit Automation Flaw Opens Enterprise File Transfer Systems to Unauthenticated Takeover +\u00a0Video\n\nIntroduction: A critical authentication bypass vulnerability (CVE-2026-4670, CVSS 9.8) and a high-severity privilege escalation flaw (CVE-2026-5174, CVSS 7.7) have been disclosed in\u2026", "creation_timestamp": "2026-05-06T05:24:22.185250Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/799d8809-c500-4b3c-bbb3-54fca2c7bc16/export</guid>
      <pubDate>Wed, 06 May 2026 05:24:22 +0000</pubDate>
    </item>
    <item>
      <title>8ce6f374-9e98-47d1-93d7-792bb794c6fa</title>
      <link>https://vulnerability.circl.lu/sighting/8ce6f374-9e98-47d1-93d7-792bb794c6fa/export</link>
      <description>{"uuid": "8ce6f374-9e98-47d1-93d7-792bb794c6fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0133", "content": "Progress heeft kwetsbaarheden verholpen in MOVEit Automation. De kwetsbaarheid met kenmerk CVE-2026-4670 betreft een bypass van de authenticatie in MOVEit Automation. Een kwaadwillende zonder rechten kan deze kwetsbaarheid misbruiken zonder dat daar gebruikersinteractie voor nodig is. \n\nDe tweede kwetsbaarheid met kenmerk CVE-2026-5174 betreft een onjuiste invoervalidatie in Progress Software MOVEit Automation en maakt privilege-escalatie mogelijk.\n\nDeze kwetsbaarheden zijn aanwezig in versies 2025.0.0 tot maar niet inclusief 2025.0.9, versies 2024.0.0 tot maar niet inclusief 2024.1.8, en alle versies v\u00f3\u00f3r 2024.0.0.", "creation_timestamp": "2026-05-06T07:18:44.000000Z"}</description>
      <content:encoded>{"uuid": "8ce6f374-9e98-47d1-93d7-792bb794c6fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0133", "content": "Progress heeft kwetsbaarheden verholpen in MOVEit Automation. De kwetsbaarheid met kenmerk CVE-2026-4670 betreft een bypass van de authenticatie in MOVEit Automation. Een kwaadwillende zonder rechten kan deze kwetsbaarheid misbruiken zonder dat daar gebruikersinteractie voor nodig is. \n\nDe tweede kwetsbaarheid met kenmerk CVE-2026-5174 betreft een onjuiste invoervalidatie in Progress Software MOVEit Automation en maakt privilege-escalatie mogelijk.\n\nDeze kwetsbaarheden zijn aanwezig in versies 2025.0.0 tot maar niet inclusief 2025.0.9, versies 2024.0.0 tot maar niet inclusief 2024.1.8, en alle versies v\u00f3\u00f3r 2024.0.0.", "creation_timestamp": "2026-05-06T07:18:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/8ce6f374-9e98-47d1-93d7-792bb794c6fa/export</guid>
      <pubDate>Wed, 06 May 2026 07:18:44 +0000</pubDate>
    </item>
    <item>
      <title>f49234f9-b5cb-4bd7-9f20-38141a530260</title>
      <link>https://vulnerability.circl.lu/sighting/f49234f9-b5cb-4bd7-9f20-38141a530260/export</link>
      <description>{"uuid": "f49234f9-b5cb-4bd7-9f20-38141a530260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://www.cert.se/2026/05/cert-se-veckobrev-v19.html", "content": "", "creation_timestamp": "2026-05-08T06:10:00.000000Z"}</description>
      <content:encoded>{"uuid": "f49234f9-b5cb-4bd7-9f20-38141a530260", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://www.cert.se/2026/05/cert-se-veckobrev-v19.html", "content": "", "creation_timestamp": "2026-05-08T06:10:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f49234f9-b5cb-4bd7-9f20-38141a530260/export</guid>
      <pubDate>Fri, 08 May 2026 06:10:00 +0000</pubDate>
    </item>
  </channel>
</rss>
